Arxiv Selected Papers
2025-11-01
Generated at 2025-11-01 13:27 UTC2025-10-31
Generated at 2025-10-31 13:33 UTC2025-10-30
Generated at 2025-10-30 13:35 UTC2025-10-29
Generated at 2025-10-29 13:36 UTC2025-10-28
Generated at 2025-10-28 16:09 UTC- Linear effects, exceptions, and resource safety: a Curry-Howard
correspondence for destructorsAuthor(s): Sidney Congard, Guillaume Munch-Maccagnoni, Rémi DouencePrimary Category: cs.PLCategories: cs.PL, cs.LOLast Updated: 2025-10-27 16:56 UTC
TL;DR
- Addresses the challenge of combining linear types, effects (like resource allocation/deallocation), and exceptions while preserving resource safety guarantees in programming languages.
- Uses a monadic framework with destructors (inspired by C++/Rust) that trigger automatic cleanup actions, modeling moves and exceptions through side-effecting type system rules.
- Ensures resources like memory are never leaked even when exceptions occur, directly improving memory safety and reliability in low-level systems programming.
- Are Agents Just Automata? On the Formal Equivalence Between Agentic AI
and the Chomsky HierarchyAuthor(s): Roham Koohestani, Ziyou Li, Anton Podkopaev, Maliheh IzadiPrimary Category: cs.AICategories: cs.AI, cs.FLLast Updated: 2025-10-27 16:22 UTC
TL;DR
- Addresses the inability to formally verify the safety and predictability of AI agents due to their undefined computational power boundaries.
- Maps agent memory architectures to automata classes: reflex agents to finite automata, hierarchical agents to pushdown automata, and reflective agents to Turing machines.
- Enables formal verification of agent behavior, allowing security guarantees for memory-safe agent designs and risk quantification for undecidable systems.
- Proceedings of the Combined 32nd International Workshop on
Expressiveness in Concurrency and 22nd Workshop on Structural Operational
SemanticsAuthor(s): Cinzia Di Giusto, Giorgio BacciPrimary Category: cs.LOCategories: cs.LO, cs.FLLast Updated: 2025-10-27 11:01 UTC
TL;DR
- This is a workshop proceedings, not a research paper addressing a specific security problem or presenting a technical method.
- It contains multiple papers on formal semantics and concurrency theory rather than proposing a single security mechanism.
- Understanding formal semantics matters for memory safety as it provides mathematical foundations for verifying correctness of low-level systems and concurrent programs.
- Beyond Imprecise Distance Metrics: LLM-Predicted Target Call Stacks for
Directed Greybox FuzzingAuthor(s): Yifan Zhang, Xin ZhangPrimary Category: cs.CRCategories: cs.CR, cs.PL, cs.SELast Updated: 2025-10-27 08:17 UTC
TL;DR
- Problem: Directed greybox fuzzers waste time on irrelevant execution paths due to imprecise static analysis-based distance metrics that over-approximate mutation probabilities.
- Method: Uses LLMs to predict vulnerability-triggering call stacks from static call graphs, then prioritizes seeds whose execution paths overlap most with these precise call sequences.
- Impact: Achieves 1.86x–3.09x faster vulnerability triggering in real programs and found 10 new CVEs, demonstrating concrete improvements in fuzzing efficiency and memory safety bug discovery.
- Anvil: A General-Purpose Timing-Safe Hardware Description LanguageAuthor(s): Jason Zhijingcheng Yu, Aditya Ranjan Jha, Umang Mathur, Trevor E. Carlson, Prateek SaxenaPrimary Category: cs.ARCategories: cs.AR, cs.PL, B.5.2; D.3.1Last Updated: 2025-10-27 04:57 UTC
TL;DR
- Addresses timing hazards in hardware design caused by unintended signal value changes during multi-cycle operations, a common source of critical bugs in digital circuits.
- Uses a type system that statically enforces timing contracts between register mutations and signal usages, preventing unsafe value changes without sacrificing cycle-level timing control.
- Eliminates a major class of hardware vulnerabilities by ensuring timing safety across module boundaries, directly preventing erratic behavior that could compromise system reliability and security.